Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84’s security is vital. The discrete phase randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for a small number of finite pulses, i.e., (10^7), if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, i.e., 16 discrete phases, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.
{"title":"Finite key analysis for discrete phase randomized BB84 protocol","authors":"Xiao-Hang Jin, Zhen-Qiang Yin, Shuang Wang, Wei Chen, Guang-Can Guo, Zheng-Fu Han","doi":"10.1007/s11128-024-04520-9","DOIUrl":"https://doi.org/10.1007/s11128-024-04520-9","url":null,"abstract":"<p>Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84’s security is vital. The discrete phase randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for a small number of finite pulses, i.e., <span>(10^7)</span>, if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, i.e., 16 discrete phases, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-30DOI: 10.1007/s11128-024-04519-2
Yongsheng Tang, Ting Yao, Heqian Xu, Xiaoshan Kai
Let R be the finite chain ring (mathbb {F}_{p^{2m}}+{u}mathbb {F}_{p^{2m}}), where (mathbb {F}_{p^{2m}}) is the finite field with (p^{2m}) elements, p is a prime, m is a non-negative integer and ({u}^{2}=0.) In this paper, we firstly define a class of Gray maps, which changes the Hermitian self-orthogonal property of linear codes over (mathbb {F}_{2^{2m}}+{u}mathbb {F}_{2^{2m}}) into the Hermitian self-orthogonal property of linear codes over (mathbb {F}_{2^{2m}}). Applying the Hermitian construction, a new class of (2^{m})-ary quantum codes are obtained from Hermitian constacyclic self-orthogonal codes over (mathbb {F}_{2^{2m}}+{u}mathbb {F}_{2^{2m}}.) We secondly define another class of maps, which changes the Hermitian self-orthogonal property of linear codes over R into the trace self-orthogonal property of linear codes over (mathbb {F}_{p^{2m}}). Using the Symplectic construction, a new class of (p^{m})-ary quantum codes are obtained from Hermitian constacyclic self-orthogonal codes over R.
{"title":"New quantum codes from constacyclic codes over finite chain rings","authors":"Yongsheng Tang, Ting Yao, Heqian Xu, Xiaoshan Kai","doi":"10.1007/s11128-024-04519-2","DOIUrl":"https://doi.org/10.1007/s11128-024-04519-2","url":null,"abstract":"<p>Let <i>R</i> be the finite chain ring <span>(mathbb {F}_{p^{2m}}+{u}mathbb {F}_{p^{2m}})</span>, where <span>(mathbb {F}_{p^{2m}})</span> is the finite field with <span>(p^{2m})</span> elements, <i>p</i> is a prime, <i>m</i> is a non-negative integer and <span>({u}^{2}=0.)</span> In this paper, we firstly define a class of Gray maps, which changes the Hermitian self-orthogonal property of linear codes over <span>(mathbb {F}_{2^{2m}}+{u}mathbb {F}_{2^{2m}})</span> into the Hermitian self-orthogonal property of linear codes over <span>(mathbb {F}_{2^{2m}})</span>. Applying the Hermitian construction, a new class of <span>(2^{m})</span>-ary quantum codes are obtained from Hermitian constacyclic self-orthogonal codes over <span>(mathbb {F}_{2^{2m}}+{u}mathbb {F}_{2^{2m}}.)</span> We secondly define another class of maps, which changes the Hermitian self-orthogonal property of linear codes over <i>R</i> into the trace self-orthogonal property of linear codes over <span>(mathbb {F}_{p^{2m}})</span>. Using the Symplectic construction, a new class of <span>(p^{m})</span>-ary quantum codes are obtained from Hermitian constacyclic self-orthogonal codes over <i>R</i>.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-30DOI: 10.1007/s11128-024-04516-5
Mitali Sisodia, Manoj Kumar Mandal, Binayak S. Choudhury
The way a new type of state called a hybrid state, which contains more than one degree of freedom, is used in many practical applications of quantum communication tasks with lesser amount of resources. Similarly, our aim is here to perform multi-quantum communication tasks in a protocol to approach quantum information in multi-purpose and multi-directional. We propose a hybrid multi-directional six-party scheme of implementing quantum teleportation and joint remote state preparation under the supervision of a controller via a multi-qubit entangled state as a quantum channel with (100%) success probability. Moreover, we analytically derive the average fidelities of this hybrid scheme under the amplitude-damping and the phase-damping noise.
{"title":"Hybrid multi-directional quantum communication protocol","authors":"Mitali Sisodia, Manoj Kumar Mandal, Binayak S. Choudhury","doi":"10.1007/s11128-024-04516-5","DOIUrl":"https://doi.org/10.1007/s11128-024-04516-5","url":null,"abstract":"<p>The way a new type of state called a hybrid state, which contains more than one degree of freedom, is used in many practical applications of quantum communication tasks with lesser amount of resources. Similarly, our aim is here to perform multi-quantum communication tasks in a protocol to approach quantum information in multi-purpose and multi-directional. We propose a hybrid multi-directional six-party scheme of implementing quantum teleportation and joint remote state preparation under the supervision of a controller via a multi-qubit entangled state as a quantum channel with <span>(100%)</span> success probability. Moreover, we analytically derive the average fidelities of this hybrid scheme under the amplitude-damping and the phase-damping noise.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose an effective scheme to predict nonreciprocal unconventional magnon blockade in a hybrid system composed of a rotating pump cavity, a signal cavity and a yttrium iron-garnet (YIG) sphere. The two cavities interact nonlinearly, and meanwhile, the signal cavity couples to magnon in the YIG sphere via magnetic dipole interaction. Based on the dispersive couplings between two cavities and between the signal cavity and magnon, the indirect nonlinear interaction is established between the pump cavity and magnon modes, which plays an important role in the generation of magnon blockade. The system exhibits nonreciprocal unconventional magnon blockade phenomenon when the pump cavity is driven from clockwise or counterclockwise directions. These phenomena occur in weak coupling and driving regimes, which could relax the requirements of the system parameters and may have potential applications in quantum information processing in hybrid systems.
{"title":"Nonreciprocal unconventional magnon blockade in nonlinear cavity electromagnonical system","authors":"Yujie Fang, Wenxue Zhong, Guangling Cheng, Aixi Chen","doi":"10.1007/s11128-024-04517-4","DOIUrl":"https://doi.org/10.1007/s11128-024-04517-4","url":null,"abstract":"<p>We propose an effective scheme to predict nonreciprocal unconventional magnon blockade in a hybrid system composed of a rotating pump cavity, a signal cavity and a yttrium iron-garnet (YIG) sphere. The two cavities interact nonlinearly, and meanwhile, the signal cavity couples to magnon in the YIG sphere via magnetic dipole interaction. Based on the dispersive couplings between two cavities and between the signal cavity and magnon, the indirect nonlinear interaction is established between the pump cavity and magnon modes, which plays an important role in the generation of magnon blockade. The system exhibits nonreciprocal unconventional magnon blockade phenomenon when the pump cavity is driven from clockwise or counterclockwise directions. These phenomena occur in weak coupling and driving regimes, which could relax the requirements of the system parameters and may have potential applications in quantum information processing in hybrid systems.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-27DOI: 10.1007/s11128-024-04496-6
Kexin Hu, Zhihui Li, Xingjia Wei, Haozhe Duan
In this paper, we first study the maximally commutative set in prime dimensional systems, which is a set of generalized Pauli matrices, and it can be used to detect the local discrimination of generalized Bell states. We give a simple characterization of prime dimensional maximally commutative sets, that is, a subset of a set of generalized Bell states, whose second subscript is a multiple of the first subscript. Furthermore, some sets of generalized Bell states which can be locally distinguishable by one-way local operation and classical communication (LOCC) are constructed by using the structural characteristics of prime dimensional maximally commutative sets. Based on these distinguishable generalized Bell states, we propose a (t, n)-threshold quantum secret sharing scheme. Compared with the existing quantum secret sharing scheme, it can be found that there are enough distinguishable states to encode classical information in our scheme, the dealer only needs to send entangled particles once to make the participants get their secret share, which makes the secret sharing process more efficient than the existing schemes. Finally, we prove that this protocol is secure under dishonest participant attack, interception-and-resend attack and entangle-and-measure attack.
{"title":"Quantum secret sharing scheme based on prime dimensional locally distinguishable states","authors":"Kexin Hu, Zhihui Li, Xingjia Wei, Haozhe Duan","doi":"10.1007/s11128-024-04496-6","DOIUrl":"https://doi.org/10.1007/s11128-024-04496-6","url":null,"abstract":"<p>In this paper, we first study the maximally commutative set in prime dimensional systems, which is a set of generalized Pauli matrices, and it can be used to detect the local discrimination of generalized Bell states. We give a simple characterization of prime dimensional maximally commutative sets, that is, a subset of a set of generalized Bell states, whose second subscript is a multiple of the first subscript. Furthermore, some sets of generalized Bell states which can be locally distinguishable by one-way local operation and classical communication (LOCC) are constructed by using the structural characteristics of prime dimensional maximally commutative sets. Based on these distinguishable generalized Bell states, we propose a (<i>t</i>, <i>n</i>)-threshold quantum secret sharing scheme. Compared with the existing quantum secret sharing scheme, it can be found that there are enough distinguishable states to encode classical information in our scheme, the dealer only needs to send entangled particles once to make the participants get their secret share, which makes the secret sharing process more efficient than the existing schemes. Finally, we prove that this protocol is secure under dishonest participant attack, interception-and-resend attack and entangle-and-measure attack.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a study on the structure of 1-generator quasi-cyclic (QC) codes over the non-chain ring (R=mathbb {F}_{q}+umathbb {F}_{q}+vmathbb {F}_{q}+uvmathbb {F}_{q}), where (u^2=v^2=0,~ uv=vu), and (mathbb {F}_q) is a finite field of cardinality (q=p^r); p is a prime. A minimal spanning set and size of these codes are determined. A sufficient condition for 1-generator QC codes over R to be free is given. BCH-type bounds on the minimum distance of free QC codes over R are also presented. Some optimal linear codes over (mathbb {F}_q) are obtained as the Gray images of quasi-cyclic codes over R. Some characterizations of the Gray images of QC codes over R in (mathbb {F}_q) and (mathbb {F}_q+umathbb {F}_q~(u^2=0)) are done. As an application, we consider self-orthogonal subcodes of the Gray images of QC codes over R to obtain new and better quantum codes than those are available in the literature.
本文研究了非链环 (R=mathbb {F}_{q}+umathbb {F}_{q}+vmathbb {F}_{q}+uvmathbb {F}_{q})上的单发准循环(QC)码的结构、其中 (u^2=v^2=0,~uv=vu),并且 (mathbb {F}_q) 是一个有限域,其 cardinality 为 (q=p^r);p 是素数。确定了这些编码的最小跨集和大小。给出了 R 上的单生成器 QC 码是自由码的充分条件。还提出了关于 R 上自由 QC 码最小距离的 BCH 型约束。作为 R 上准循环码的灰度图像,我们得到了一些最优线性码。作为应用,我们考虑了 R 上 QC 码灰色图像的自正交子码,以获得比文献中现有的更好的新量子码。
{"title":"On quantum codes derived from quasi-cyclic codes over a non-chain ring","authors":"Shivanshu Benjwal, Maheshanand Bhaintwal, Raj Kumar","doi":"10.1007/s11128-024-04514-7","DOIUrl":"https://doi.org/10.1007/s11128-024-04514-7","url":null,"abstract":"<p>This paper presents a study on the structure of 1-generator quasi-cyclic (QC) codes over the non-chain ring <span>(R=mathbb {F}_{q}+umathbb {F}_{q}+vmathbb {F}_{q}+uvmathbb {F}_{q})</span>, where <span>(u^2=v^2=0,~ uv=vu)</span>, and <span>(mathbb {F}_q)</span> is a finite field of cardinality <span>(q=p^r)</span>; <i>p</i> is a prime. A minimal spanning set and size of these codes are determined. A sufficient condition for 1-generator QC codes over <i>R</i> to be free is given. BCH-type bounds on the minimum distance of free QC codes over <i>R</i> are also presented. Some optimal linear codes over <span>(mathbb {F}_q)</span> are obtained as the Gray images of quasi-cyclic codes over <i>R</i>. Some characterizations of the Gray images of QC codes over <i>R</i> in <span>(mathbb {F}_q)</span> and <span>(mathbb {F}_q+umathbb {F}_q~(u^2=0))</span> are done. As an application, we consider self-orthogonal subcodes of the Gray images of QC codes over <i>R</i> to obtain new and better quantum codes than those are available in the literature.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-25DOI: 10.1007/s11128-024-04501-y
Hui Zhao, Pan-Wen Ma, Shao-Ming Fei, Zhi-Xi Wang
We present proper genuine multipartite entanglement (GME) measures for arbitrary multipartite and dimensional systems. By using the volume of concurrence regular polygonal pyramid, we first derive the GME measure of four-partite quantum systems. From our measure, it is verified that the GHZ state is more entangled than the W state. Then, we study the GME measure for multipartite quantum states in arbitrary dimensions. A well-defined GME measure is constructed based on the volume of the concurrence regular polygonal pyramid. Detailed example shows that our measure can characterize better the genuine multipartite entanglements.
{"title":"Geometric genuine N-partite entanglement measure for arbitrary dimensions","authors":"Hui Zhao, Pan-Wen Ma, Shao-Ming Fei, Zhi-Xi Wang","doi":"10.1007/s11128-024-04501-y","DOIUrl":"https://doi.org/10.1007/s11128-024-04501-y","url":null,"abstract":"<p>We present proper genuine multipartite entanglement (GME) measures for arbitrary multipartite and dimensional systems. By using the volume of concurrence regular polygonal pyramid, we first derive the GME measure of four-partite quantum systems. From our measure, it is verified that the GHZ state is more entangled than the W state. Then, we study the GME measure for multipartite quantum states in arbitrary dimensions. A well-defined GME measure is constructed based on the volume of the concurrence regular polygonal pyramid. Detailed example shows that our measure can characterize better the genuine multipartite entanglements.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-24DOI: 10.1007/s11128-024-04505-8
Ran Guo, Ri-Gui Zhou, Xiao-Xue Zhang
As one of the most important branches of quantum information science, quantum communication is known for its unconditional security and efficiency. Nevertheless, the practical security of quantum key distribution protocols and quantum secure direct communication protocols is challenged due to the imperfections in experimental devices. Despite significant progress in theoretical and experimental research on the MDI-QSDC Protocol, challenges and unresolved issues remain. For example, further enhancing the scalability and system complexity of the protocol to meet the demands of large-scale quantum networks is necessary. In this paper, we propose a multi-party MDI-QSDC scheme based on multi-degree-of-freedom hyperentangled photons. Compared to the original MDI-QSDC protocol, our protocol allows multiple parties to participate in the information transmission process. For example, for four communicating parties, we can encode the information of three independent degrees of freedom so that each photon of each degree of freedom can transmit 2 bits of information. Moreover, all measurement tasks are performed by the fifth party, which can be untrusted or even completely controlled by eavesdroppers. The protocol is resistant to all possible attacks from imperfect measurement devices. It can eventually be extended to arbitrary degrees of freedom, allowing multiple parties to participate.
{"title":"Measurement-device-independent multi-party quantum secure direct communication","authors":"Ran Guo, Ri-Gui Zhou, Xiao-Xue Zhang","doi":"10.1007/s11128-024-04505-8","DOIUrl":"https://doi.org/10.1007/s11128-024-04505-8","url":null,"abstract":"<p>As one of the most important branches of quantum information science, quantum communication is known for its unconditional security and efficiency. Nevertheless, the practical security of quantum key distribution protocols and quantum secure direct communication protocols is challenged due to the imperfections in experimental devices. Despite significant progress in theoretical and experimental research on the MDI-QSDC Protocol, challenges and unresolved issues remain. For example, further enhancing the scalability and system complexity of the protocol to meet the demands of large-scale quantum networks is necessary. In this paper, we propose a multi-party MDI-QSDC scheme based on multi-degree-of-freedom hyperentangled photons. Compared to the original MDI-QSDC protocol, our protocol allows multiple parties to participate in the information transmission process. For example, for four communicating parties, we can encode the information of three independent degrees of freedom so that each photon of each degree of freedom can transmit 2 bits of information. Moreover, all measurement tasks are performed by the fifth party, which can be untrusted or even completely controlled by eavesdroppers. The protocol is resistant to all possible attacks from imperfect measurement devices. It can eventually be extended to arbitrary degrees of freedom, allowing multiple parties to participate.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-24DOI: 10.1007/s11128-024-04511-w
Vladimir V. Arsoski
Quantum computing has the potential to solve many complex algorithms in the domains of optimization, arithmetics, structural search, financial risk analysis, machine learning, image processing, and others. Quantum circuits built to implement these algorithms usually require multi-controlled gates as fundamental building blocks, where the multi-controlled Toffoli stands out as the primary example. For implementation in quantum hardware, these gates should be decomposed into many elementary gates, which results in a large depth of the final quantum circuit. However, even moderately deep quantum circuits have low fidelity due to decoherence effects and, thus, may return an almost perfectly uniform distribution of the output results. This paper proposes a different approach for efficient cost multi-controlled gates implementation using the quantum Fourier transform. We show how the depth of the circuit can be significantly reduced using only a few ancilla qubits, making our approach viable for application to noisy intermediate-scale quantum computers. This quantum arithmetic-based approach can be efficiently used to implement many complex quantum gates.
{"title":"Implementing multi-controlled X gates using the quantum Fourier transform","authors":"Vladimir V. Arsoski","doi":"10.1007/s11128-024-04511-w","DOIUrl":"https://doi.org/10.1007/s11128-024-04511-w","url":null,"abstract":"<p>Quantum computing has the potential to solve many complex algorithms in the domains of optimization, arithmetics, structural search, financial risk analysis, machine learning, image processing, and others. Quantum circuits built to implement these algorithms usually require multi-controlled gates as fundamental building blocks, where the multi-controlled Toffoli stands out as the primary example. For implementation in quantum hardware, these gates should be decomposed into many elementary gates, which results in a large depth of the final quantum circuit. However, even moderately deep quantum circuits have low fidelity due to decoherence effects and, thus, may return an almost perfectly uniform distribution of the output results. This paper proposes a different approach for efficient cost multi-controlled gates implementation using the quantum Fourier transform. We show how the depth of the circuit can be significantly reduced using only a few ancilla qubits, making our approach viable for application to noisy intermediate-scale quantum computers. This quantum arithmetic-based approach can be efficiently used to implement many complex quantum gates.</p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-21DOI: 10.1007/s11128-024-04489-5
Pooja Soni, Manju Pruthi
In this article, we find several novel and efficient quantum error-correcting codes ((boldsymbol{mathcal{Q}})ecc) by studying the structure of constacyclic ((boldsymbol{{mathcal{C}}{mathcalligra{cc}}})), cyclic ((boldsymbol{{mathcal{C}}{mathcalligra{c}}})), and negacyclic codes (N(boldsymbol{{mathcal{C}}{mathcalligra{c}}})) over the ring ({A}_{k}={Z}_{p}left[{r}_{1},{r}_{2},dots ,{r}_{k}right])/(langle {{(r}_{b}}^{({m}_{b}+1)}-{r}_{b}), {r}_{l}{r}_{b}={r}_{b}{r}_{l}=0, bne lrangle ), where (p={q}^{m}) for m, ({m}_{b}in {mathbb{N}}), ({m}_{b} | left(-1+qright))(forall b, l in left{1, text{to}, kright}), (qge 3) is a prime, ({Z}_{p}) is a finite field. We define distance-preserving gray map ({delta }_{k}). Moreover, we determine the quantum singleton defect ((mathcal{Q})SD) of (boldsymbol{mathcal{Q}})ecc, which indicates their overall quality. We compare our codes with existing codes in recent publications. The rings discussed by Kong et al. (EPJ Quantum Technol 10:1–16, 2023), Suprijanto et al. (Quantum codes constructed from cyclic codes over the ring(F_{text{q}}+{text{vF}}_{text{q}}+{v}^{2}F_{text{q}}+{v}^{3}F_{text{q}}+{v}^{4}F_{text{q}}), pp 1–14, 2021. arXiv: 2112.13488v2 [cs.IT]), and Dinh et al. (IEEE Access 8:194082–194091, 2020) are specific cases of our work. Furthermore, we construct several novel and optimum linear complementary dual (Lcd) codes over ({A}_{k}.)
在这篇文章中,我们通过研究常环码(constacyclic codes)、循环码(cyclic codes)和负环码(negacyclic codes)的结构,发现了几种新颖高效的量子纠错码(ec)、以及环 ({A}_{k}={Z}_{p}left[{r}_{1},{r}_{2},dots 、{r}_{k}right])/(angle {{(r}_{b}}^{({m}_{b}+1)}-{r}_{b}), {r}_{l}{r}_{b}={r}_{b}{r}_{l}=0, bne lrangle ),其中 (p={q}^{m}) for m, ({m}_{b}in {mathbb{N}}),({m}_{b}}.| (左(-1+右)))(对于所有的 b, l 在left{1, text{to}, kright}), (qge 3) 是一个素数,({Z}_{p}) 是一个有限域。我们定义了保距灰度映射({delta }_{k})。此外,我们还确定了 (boldsymbol{mathcal{Q}})ecc 的量子单子缺陷((mathcal{Q})SD),这表明了它们的整体质量。我们将我们的代码与最近发表的现有代码进行比较。Kong 等人(EPJ Quantum Technol 10:1-16, 2023)、Suprijanto 等人(Suprijanto et al.(Quantum codes constructed from cyclic codes over the ring(F_{text{q}}+{text{vF}}_{text{q}}+{v}^{2}F_{text{q}}+{v}^{3}F_{text{q}}+{v}^{4}F_{text{q}}), pp 1-14, 2021.arXiv: 2112.13488v2 [cs.IT])和 Dinh 等人(IEEE Access 8:194082-194091, 2020)是我们工作的具体案例。此外,我们还在({A}_{k}.)上构造了几种新颖且最优的线性互补对偶(Lcd)编码。
{"title":"New optimized Lcd codes and quantum codes using constacyclic codes over a non-local collection of rings $${{varvec{A}}}_{{varvec{k}}}$$","authors":"Pooja Soni, Manju Pruthi","doi":"10.1007/s11128-024-04489-5","DOIUrl":"https://doi.org/10.1007/s11128-024-04489-5","url":null,"abstract":"<p>In this article, we find several novel and efficient quantum error-correcting codes (<span>(boldsymbol{mathcal{Q}})</span><b>ecc</b>) by studying the structure of constacyclic (<span>(boldsymbol{{mathcal{C}}{mathcalligra{cc}}})</span>), cyclic (<span>(boldsymbol{{mathcal{C}}{mathcalligra{c}}})</span>), and negacyclic codes (<b>N</b><span>(boldsymbol{{mathcal{C}}{mathcalligra{c}}})</span>) over the ring <span>({A}_{k}={Z}_{p}left[{r}_{1},{r}_{2},dots ,{r}_{k}right])</span>/<span>(langle {{(r}_{b}}^{({m}_{b}+1)}-{r}_{b}), {r}_{l}{r}_{b}={r}_{b}{r}_{l}=0, bne lrangle )</span>, where <span>(p={q}^{m})</span> for m, <span>({m}_{b}in {mathbb{N}})</span>, <span>({m}_{b} | left(-1+qright))</span> <span>(forall b, l in left{1, text{to}, kright})</span>, <span>(qge 3)</span> is a prime, <span>({Z}_{p})</span> is a finite field. We define distance-preserving gray map <span>({delta }_{k})</span>. Moreover, we determine the quantum singleton defect (<span>(mathcal{Q})</span>SD) of <span>(boldsymbol{mathcal{Q}})</span><b>ecc</b>, which indicates their overall quality. We compare our codes with existing codes in recent publications. The rings discussed by Kong et al. (EPJ Quantum Technol 10:1–16, 2023), Suprijanto et al. (Quantum codes constructed from cyclic codes over the ring<span>(F_{text{q}}+{text{vF}}_{text{q}}+{v}^{2}F_{text{q}}+{v}^{3}F_{text{q}}+{v}^{4}F_{text{q}})</span>, pp 1–14, 2021. arXiv: 2112.13488v2 [cs.IT]), and Dinh et al. (IEEE Access 8:194082–194091, 2020) are specific cases of our work. Furthermore, we construct several novel and optimum linear complementary dual (Lcd) codes over <span>({A}_{k}.)</span></p>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142190881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}